Learn More
In this paper we compare four risk analysis methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. Mehari is a method for risk analysis and risk management developed by CLUSIF (Club de la Securite del' Information Francais). Magerit is a risk analysis and management methodology for information systems developed by CSAE (Consejo(More)
A multicenter randomized controlled study was conducted to assess the long-term efficacy and safety of cyclosporin A therapy for psoriasis using either a continuous or an intermittent regimen. Initially, both regimens consisted of 3-5 mg/kg/day administration of CyA. Once remission was obtained, CyA dose was maintained between 0.5 and 3 mg/kg/day under the(More)
Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important(More)
The Internet of Things (IoTs) is an emerging concept referring to networked everyday objects that interconnect to each other via wireless sensors attached to them. TESLA is a source authentication protocol for the broadcast network. Scalability of TESLA is limited by distribution of its unicast-based initial parameter. Low energy consumption version of(More)
Various new transport protocols have been proposed with the aim of the efficient use of abundant resources in fast long-distance networks, and a number of experiments to investigate the performances of those protocols have already been reported. However, they have mainly focused on the throughput characteristics of a single connection or under a stable(More)
With the multiplication of attacks against computer networks, system administrators need to monitor carefully the networks they manage. However, that monitoring task is made harder because of the increasing amount of data to process. Conventional automated tools provide limited support and most of the time require high skilled operators. Recently, tools(More)
In a society preoccupied with gradual erosion of electronic privacy, loss of privacy in current DNS queries is an important issue worth considering. From the definition, the privacy problem is to prove that none of the private data can be inferred from the information which is made public. The privacy disclosure problem in DNS Query was well analyzed by(More)